Microsoft Cloud Integration Bundle

What is the Microsoft Cloud Integration Bundle?

The Microsoft Cloud Integration Bundle is Rewst’s solution for integrating your most common Microsoft tools. It’s a little different from our other integrations in that we group multiple integrations together, by brand, to allow for easier and more custom integration options during setup.

Though you’ll be working from one integration menu tile to set up all integrations, each integration will appear as its own section with its own actions in the actions list of the workflow builder.

For detailed permission breakdown for all Microsoft integrations in the bundle, see our separate documentation here.

Why use the Microsoft Cloud Integration Bundle?

  • Customize permissions tailored to your organization’s needs.

  • Centralize the management of all Microsoft integrations through the Rewst platform.

  • Protect your data with enhanced security measures.

  • Keep your integrations current with continuous updates and enhancements.

What integrations are in the Microsoft Cloud Integration Bundle?

You'll be prompted to check off any or all of the following integrations to be included in your setup process. The Microsoft Cloud Integration Bundle contains integrations for:

"Microsoft Cloud Integration Bundle” setup interface. At the top, icons represent Rewst, a link, and Microsoft Cloud. A progress bar shows four steps: 1) Select Integrations, 2) Configuration Parameters, 3) Tenant Permissions, and 4) Authorize Integrations, with step 1 highlighted. The main section lists integration options with checkboxes: Microsoft Graph (checked, required), Microsoft Exchange Online, Microsoft CSP, and Microsoft Azure. Each option includes its logo and a description of what the integration enables. At the bottom right, there is a turquoise “Next” button. The interface has a dark background with white text.
The Select Integrations screen of the Microsoft Cloud Integration Bundle's configuration process
  1. Microsoft Graph: A unified API that provides a single endpoint for accessing and managing data and intelligence across Microsoft 365, Windows, and Enterprise Mobility and Security. 👉 You should check this box to install the integration to allow Rewst to make API calls. This is necessary for the bundle to work.

  2. Microsoft Exchange Online: The cloud-hosted version of the traditional Microsoft Exchange Server, offering similar functionalities but without the need for on-premises server infrastructure. 👉 You should check this box to install the integration to allow you to send Exchange Online PowerShell commands.

  3. Microsoft Cloud Solution Provider (CSP): This allows for the resale of Microsoft cloud services like Azure, Microsoft 365, and Dynamics 365 to businesses, often with added value services. It's a subscription-based model where MSPs can bill customers. 👉 You should check this box if you use the Microsoft Partner Center and want to run Rewst actions against your customer tenants.

  4. Microsoft Azure: A cloud computing platform, Azure offers a range of cloud infrastructure services, including computing, analytics, storage, networking, and AI. Note that Microsoft formerly called a different tool Azure, and renamed that tool Microsoft Entra. 👉 You should check this box to install the integration if you are already an Azure user and have an existing Azure key vault set up with Microsoft. If you don't have a key vault, you'll need to create an empty one to complete bundle setup, then check this box. Instructions for how to do this can be found here.

Set up the Microsoft Cloud Integration Bundle

We've broken down instructions into three larger steps, each with its own section. Read through the entire process before starting step 1 to familiarize yourself with what will be needed.

Click each expander to open and view that substep's instructions and information.

Step 1: Create a Microsoft service account in Microsoft Entra

To set up Rewst integration, you'll need a new service account that has Global Admin settings. Once the integration has been completed, this can be removed. If you need to uninstall and re-integrate the integration, however, and you've removed the Global Admin settings, you'll need to recreate this before reintegrating.

Create a user in Microsoft Entra to use as your Rewst service account.

  1. Navigate to Overview > +Add > User > Create new user in Microsoft Entra.

  1. Name the user Rewst.

  2. Check the box derive from user principal name.

  3. Enter a display name of Rewst Service Account.

  4. Auto generate a password.

  5. Document all the user's information within your documentation platform. Be sure to note the user principal name.

  6. Click the Properties tab. Leave all the options on this screen as default.

  7. Click Assignments > Add Role.

  8. Search for Global Administrator in the role selection. Select the role.

  9. Click Select. Verify that the role is now listed in the main pane.

  1. Make sure the service account is part of the admin agents group in Microsoft Entra.

The group selection list

How the group will appear in the Assignments list if you have this properly enabled
  1. Click Review + Create, then Create.

Turn on MFA requirement for the user

  1. Log in to the Microsoft 365 Admin Center.

  2. Navigate to Users > Active Users > Multifactor Authentication.

  3. Locate and select your Rewst service account user in the list that appears.

  4. Click Enable under the Quick Steps menu.

  5. Select the Rewst service account user again.

  6. Click Enforce under the Quick Steps menu.

  7. Click Enforce multi-factor.

Modify conditional access policy in Microsoft Azure

Set up your MSP's policies

This step is unnecessary if the tenant is under Microsoft default security settings. If you have no conditional access policies and are operating under security defaults, which already require MFA, skip to the next section.

  1. Navigate to the Conditional Access Policies blade in Azure.

  2. Remove the Rewst service account from any existing policies which may have been inherited at the time of its creation. If there are no existing policies, move on to the next step.

  3. Create a New Policy.

    • Include Rewst User: Add the Rewst user to the policy

    • Enforce MFA: Mandate Azure Multi-factor Authentication for each login and application if you have not done so already

    • Policy Name: Save this policy under the name Rewst Conditional Access Policy

Set up your Client's policies

Granular access is influenced by your clients' conditional access policies. To ensure seamless access to your clients using your Rewst integration user, follow these steps

  1. Navigate to your client's Conditional Access Policies blade in Azure.

  2. For each policy listed, add an exclusion to Users and Groups with these settings:

    • Guest or external users

    • Service Provider Users

    • Tenant ID: Enter your tenant ID. If unknown, find it at What Is My Tenant ID.

Note: Excluding the MSP from the Conditional Access Policy is recommended as per Microsoft's GDAP Documentation.

Post-modification behavior

  • Propagation time: Changes may take up to an hour to become active in the Rewst environment.

  • Quick refresh: Click the blue shield icon next to the client's name on the Microsoft Cloud Integration Bundle page in Rewst to expedite propagation.

Step 2: Register the enterprise app and authorize the Rewst integration

Register the enterprise app
  1. Choose how to register the app.

    1. Most users should select the Rewst-created enterprise app. It simplifies setup, includes the required permissions, and is secure. Unless you’re absolutely sure you need your own, choose the default option.

    2. If you are absolutely certain that you must bring your own app rather than using the Rewst-created one, choose this registration option. Owned app registration instructions can be found here: https://docs.rewst.help/documentation/configuration/integrations/integration-guides/microsoft-cloud-integration-bundle/owned-app-registration

    3. Click Next.

  2. Set permissions for Microsoft Graph.

    1. You can pick and choose from a set of pre-selected Graph permissions, or edit based on your org’s security preferences.

    2. These permissions are carefully chosen to support Crates without authentication issues.

    3. If you modify permissions from the stock ones suggested by Rewst, it’s your responsibility to verify that your custom permissions don’t interfere with Rewst’s functionality.

    4. For more detail, consult Microsoft Graph’s official permissions documentation.

  3. Grant additional access for other Microsoft integrations

    1. Exchange, CSP, and Azure, if needed, are simpler and allow you to toggle access as desired.

    2. Microsoft Graph includes ~177 APIs, and gives you broad access to users, groups, and licensing from one endpoint.

  4. Click Next.

Authorize Rewst
  1. Review your configuration decisions in the Authorize Integrations screen. Click Back f you wish to make updates. Click Authorize when satisfied with your choices.

  1. After authorizing, you’ll see:

    1. What authorized successfully

    2. Which user was used

    3. The tenant ID

    4. A corresponding Enterprise App created in Entra

This section covers the different ways you can set up your child organizations. Please read through the entire section before beginning, to determine which of the situational steps are right for you. How you complete this step will depend on the way you choose to use Rewst: If you're unsure of which of these situations apply to you, contact Rewst Support for assistance. If you are part of the Microsoft Cloud Solution Provider (CSP) program and have access to GDAP, follow the instructions below to configure GDAP before linking customers.

What is GDAP and why is it important to the setup process?

In 2024, Microsoft moved away from regular user-based access, where users logged into Microsoft Entra with an individually permissioned account. Instead, they now operate via delegated admin permissions, where permissions are assigned from the top level down, for more secure access management. This is known as Granulated Delegated Admin Permissions, or GDAP.

As part of the bundle setup process, you were asked to create a dedicated user to act as your Microsoft service account. The way this is done and the roles you adopt are important, as GDAP dictates that this will now have a direct effect on how Rewst interacts with Microsoft.

For example, let’s say that 12 roles map to 177 permissions.

  • Rewst will try to make an API call.

  • The enterprise app will look for permissions.

  • The enterprise app will ask if it is making the call at customer level, and if there are roles at the customer level.

Click to expand instructions and choose your situation from these three methods

Manage your organizations that have been registered with enterprise apps in Rewst

If you’d like to manage your internal organization with Rewst and enable it to run automations, you’ll need to assign specific roles to your Rewst service account. If you don't want to manage your internal MSP, you can remove the Global Administrator Role now. If you wish to continue managing your MSP organization, add the 12 roles indicated below to the Rewst service account. Then, remove the Global Administrator Role. Removing the role will not remove the 12 added roles.

  • If you used the Configure New GDAP Relationship Crate to set up your GDAP roles, you'll still need to manually add these roles to your Rewst service account. The Crate does not add them at the MSP parent organization level for you.

  • If you chose to set up the GDAP roles manually without using the Crate, you'll also need to manually add these roles to your Rewst service account. Note that they're the same 12 roles that you used previously.

Once this has been completed, you can remove the Global Administrator Role from your Service account

12 roles to add to Rewst Service account at the MSP level organization

Click to read more
  1. Application Administrator - Can create and manage all applications, service principals, app registration, enterprise apps, consent requests. Cannot manage directory roles, security groups.

  2. Authentication Policy Administrator - Configures authentication methods policy, MFA settings, manages Password Protection settings, creates/manages verifiable credentials, Azure support tickets. Restrictions on updating sensitive properties, deleting/restoring users, legacy MFA settings.

  3. Cloud App Security Administrator - Manages all aspects of the Defender for Cloud App Security in Azure AD, including policies, alerts, and related configurations.

  4. Cloud Device Administrator - Enables, disables, deletes devices in Azure AD, reads Windows 10 BitLocker keys. Does not grant permissions to manage other properties on the device.

  5. Exchange Administrator - Manages all aspects of Exchange Online, including mailboxes, permissions, connectivity, and related settings. Limited access to related Exchange settings in Azure AD.

  6. Intune Administrator - Manages all aspects of Intune, including all related resources, policies, configurations, and tasks.

  7. User Administrator - Manages all aspects of users, groups, registration, and resets passwords for limited admins. Cannot manage security-related policies or other configuration objects.

  8. Privileged Authentication Administrator - Sets and resets authentication methods for all users (admin or non-admin), deletes/restores any users. Manages support tickets in Azure and Microsoft 365. Restrictions on managing per-user MFA in legacy MFA portal.

  9. Privileged Role Administrator - Manages role assignments in Azure AD, Azure AD Privileged Identity Management, creates/manages groups, manages all aspects of Privileged Identity Management, administrative units. Allows managing assignments for all Azure AD roles including Global Administrator.

  10. Security Administrator - Can read security information and reports, and manages security-related features, including identity protection, security policies, device management, and threat management in Azure AD and Office 365.

  11. SharePoint Administrator - Manages all aspects of SharePoint Online, Microsoft 365 groups, support tickets, service health. Scoped permissions for Microsoft Intune, SharePoint, and OneDrive resources.

  12. Teams Administrator - Manages all aspects of Microsoft Teams, including telephony, messaging, meetings, teams, Microsoft 365 groups, support tickets, and service health.

Migrate legacy Microsoft integrations to the new Microsoft Cloud Integration Bundle

For users of the legacy setup, it's important to note that the static permissions associated with the legacy App Registration cannot be modified during this transition. Transitioning to the new bundle is highly recommended for continued functionality and security.

Migrate to new integration setup
  1. Navigate to Configuration > Integrations in the left side menu of your Rewst platform.

  2. Search for the Microsoft Cloud Bundle.

  3. Click on the integration tile.

  4. Select the Microsoft services you wish to integrate.

  5. Enter the necessary details to establish a connection.

  6. Modify permissions as needed for enhanced control.

  7. Complete the setup by authorizing the selected integrations.

Post-transition configuration

After migrating, you'll configure each integration according to your needs, including setting up OAuth configurations and mapping CSP customers to Rewst organizations.

  • Use CSP Delegated Admin permissions: Manage permissions for Cloud Solution Provider integrations, ensuring they align with delegated admin roles.

  • Microsoft Graph OAuth configuration: Set up OAuth configurations for Microsoft Graph to ensure seamless integration and data access.

  • CSP Customer to Rewst organization mapping: Map CSP customers to Rewst organizations for streamlined management and reporting.

  • Microsoft Exchange Online OAuth configuration: Configure OAuth for Exchange Online, enabling advanced email and calendar integration functionalities.

Troubleshoot the Microsoft Cloud integration bundle setup

We have a separate guide with all bundle troubleshooting information. View that page here.

Last updated

Was this helpful?